Exam 21: Public-Key Cryptography and Message Authentication

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A hash function such as SHA-1 was not designed for use as a MACand cannot be used directly for that purpose because it does not rely on a secret key.

(True/False)
4.8/5
(47)

The DSS makes use of the _________ and presents a new digital signature technique, the Digital Signature Algorithm (DSA).

(Multiple Choice)
4.8/5
(38)

The __________ uses an algorithm that is designed to provide only the digital signature function and cannot be used for encryption or key exchange.

(Multiple Choice)
4.8/5
(38)

_________ are analogous to a burglar guessing a safe combination by observing how long it takes to turn the dial from number to number.

(Multiple Choice)
4.9/5
(28)

___________ was the first published public-key algorithm.

(Multiple Choice)
4.8/5
(28)

The one-way hash function is important not only in messageauthentication but also in digital signatures.

(True/False)
4.7/5
(40)

The Diffie-Hellman algorithm depends for its effectiveness on thedifficulty of computing discrete logarithms.

(True/False)
4.9/5
(36)

The National Institute of Standards and Technology has published Federal Information Processing Standard FIPS PUB 186, known as the __________.

(Multiple Choice)
4.9/5
(31)

A ________ attack involves trying all possible private keys.

(Multiple Choice)
4.8/5
(38)

Perhaps the most widely used public-key algorithms are _________ and Diffie-Hellman.

(Short Answer)
4.8/5
(35)

One of the first public-key schemes, _______, was developed in 1977 by Ron Rivest, Adi Shamir, and Len Adleman.

(Short Answer)
5.0/5
(30)

The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be adapted to work with any implementation that does not run in fixed time.

(Multiple Choice)
4.9/5
(35)

SHA-1 is considered to be very secure.

(True/False)
4.8/5
(34)

If speed is a concern, it is fully acceptable to use _________ rather than SHA as the embedded hash function for HMAC.

(Short Answer)
4.9/5
(41)

The principal attraction of __________ compared to RSA is that it appears to offer equal security for a far smaller bit size, thereby reducing processing overhead.

(Multiple Choice)
4.9/5
(30)

Timing attacks are only applicable to RSA.

(True/False)
4.9/5
(35)

The purpose of the __________ algorithm is to enable two users to exchange a secret key securely that can then be used for subsequent encryption of messages.

(Short Answer)
4.8/5
(38)

NIST has published FIPS PUB 186, which is known as the ___________.

(Short Answer)
4.8/5
(43)

RSA is a block cipher in which the plaintext and ciphertext are integersbetween 0 and n - 1 for some n.

(True/False)
4.9/5
(30)

A __________ type of attack exploits properties of the RSA algorithm.

(Multiple Choice)
4.8/5
(42)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)